Name
Affiliation
Papers
RALF KÜSTERS
ETH Zürich, Zürich, Switzerland
69
Collaborators
Citations 
PageRank 
61
1014
69.62
Referers 
Referees 
References 
1098
934
1051
Search Limit
1001000
Title
Citations
PageRank
Year
A Security Framework for Distributed Ledgers00.342021
Accountability in a Permissioned Blockchain: Formal Analysis of Hyperledger Fabric00.342020
Joint State Composition Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation00.342020
Practical Yet Composably Secure Cryptographic Protocols (Dagstuhl Seminar 19042).00.342019
An Extensive Formal Security Analysis of the OpenID Financial-Grade API30.382019
The Web SSO Standard OpenID Connect: In-depth Formal Security Analysis and Security Guidelines50.472017
A Framework for Universally Composable Diffie-Hellman Key Exchange00.342017
Universal Composition with Responsive Environments.40.422016
Verifiability Notions for E-Voting Protocols.00.342016
sElect: A Lightweight Verifiable Remote Voting System70.492016
A Hybrid Approach for Proving Noninterference of Java Programs.120.482015
Security In E-Voting00.342014
Analyzing the BrowserID SSO System with Primary Identity Providers Using an Expressive Model of the Web.70.512014
Extending and Applying a Framework for the Cryptographic Verification of Java Programs.741.482014
The IITM Model: A Simple and Expressive Model for Universal Composability160.602013
Ideal key derivation and encryption in simulation-based security40.482011
What's in an Attribute? Consequences for the Least Common Subsumer00.342011
Security and Rewriting (Dagstuhl Seminar 11332).00.342011
Reducing Protocol Analysis with XOR to the XOR-Free Case in the Horn Theory Based Approach331.222011
Composition theorems without pre-established session identifiers180.772011
A Formal Definition of Online Abuse-Freeness20.392010
Proving coercion-resistance of scantegrity II140.652010
Deciding strategy properties of contract-signing protocols00.342010
Universally Composable Symmetric Encryption100.532009
Using ProVerif to Analyze Protocols with Diffie-Hellman Exponentiation391.242009
Computational soundness for key exchange protocols with symmetric encryption120.562009
Improving and Simplifying a Variant of Prêt à Voter10.352009
On the Relationships between Notions of Simulation-Based Security170.702008
Conditional reactive simulatability30.382008
Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation150.642008
Joint workshop on foundations of computer security and automated reasoning for security protocol analysis (FCS-ARSPA ’06)00.342008
Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption70.452008
Transducer-based analysis of cryptographic protocols20.372007
On the automatic analysis of recursive security protocols with XOR130.632007
A cryptographic model for branching time security properties: the case of contract signing protocols60.462007
Selecting theories and nonce generation for recursive protocols60.422007
On simulatability soundness and mapping soundness of symbolic cryptography70.522007
Infinite State AMC-Model Checking for Cryptographic Protocols100.562007
Implementing a Unification Algorithm for Protocol Analysis with XOR40.462006
Computationally sound symbolic secrecy in the presence of hash functions301.252006
A dolev-yao-based definition of abuse-free protocols120.722006
Proceedings of the 2005 ACM workshop on Formal methods in security engineering, FMSE 2005, Fairfax, VA, USA, November 11, 200570.542005
Constraint Solving for Contract-Signing Protocols100.552005
Deciding the Security of Protocols with Commuting Public Key Encryption110.732005
Structural Subsumption and Least Common Subsumers in a Description Logic with Existential and Number Restrictions70.572005
Deciding properties of contract-signing protocols110.582005
Automata-Based Analysis of Recursive Cryptographic Protocols160.762004
Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents703.122003
An NP Decision Procedure for Protocol Insecurity with XOR1144.612003
Extensions to description logics191.392003
  • 1
  • 2